Applied Networks & Security

Size: px
Start display at page:

Download "Applied Networks & Security"

Transcription

1 Applied Networks & Security Internet Protocol with Critical Analysis John Kristoff IT 263 Winter 2006/2007 John Kristoff - DePaul University 1

2 Critical analysis disclaimer Following this disclaimer are slides used in other versions of the course. We mark up some slides using strikethroughs and underlined red in comic sans ms 20pt font. This is not meant to slight other teachers or their material. Much of the material is good and helpful so we use it. We do this to explore complex issues, refresh dated material, correct inaccuracies and stimulate critical thinking. In some cases we are pedantic where it seems useful, but we are not exhaustive and try to avoid being overly tedious when it is unnecessary. IT 263 Winter 2006/2007 John Kristoff - DePaul University 2

3 IT 263 Applied Networks and Security IP Networking

4 Topics IP Routing What do routers do? Address Assignment - DHCP Subnets Network Address Translation (NAT) Domain Name System (DNS) services TCP/IP Utility programs Read chapters 3 and 5

5 What do routers do? Store and Forward packets based on destination IP address Interconnect multiple IP subnets Provide a gateway between different physical networks. Provide a boundary for network security and management May also provide other services: Firewall services Traffic prioritization (QOS)

6 Where do routers go? Each router port connects to a hub, switch or another router. Internal routers interconnect LANs within an organization (Intranet). An access or WAN router is used to connect LANs into a WAN network (Usually private WAN) Border routers provide access to the Internet Connects to the ISP router.

7 SOHO router Subnet #1 Subnet #2 Client PC Client PC Client PC Server Client PC Client PC Client PC Server Ethernet Hub/Switch Ethernet Hub/Switch Router / Firewall Modem / CSU CATV or DSL or T-1 Line

8 Internet Service PCs with LAN card and TCP/IP Software LAN Customer Site IP Router IP Router CSU Dial-Up (POTS) Access Line: Host Access Modem Modem PC without TCP/IP Software Dial-Up (POTS) Access Line: SLIP/PPP Access Modem PC with TCP/IP Software and SLIP/PPP Software Carrier IP Access Router with ISDN card Leased Access Line IP Router IP Router Regional ISP Network IP Router Private Peering Link between ISPs UNIX Host IP Router Modem Regional ISP Network IP Router National ISP Backbone IP Router IP Router IP Router Customer Site IP Router with ISDN card IP Router Leased Access Line CSU PCs with LAN card and TCP/IP Software LAN Mainframe with TCP/IP Software

9 IP Addresses Each IP address is 4 bytes long Dotted decimal notation Each byte (8 bits) is written in decimal separated by dots, like Each of the 4 values is in range Example:

10 IP Addresses IP address contains 3 parts (not that simple) An IP Network part that is used by Internet backbone routers to deliver packets to a particular Network. An optional IP Subnet part that is used by access and internal routers within an IP Network to deliver packets to a particular Subnet. An IP Host part that identifies a particular individual device on the subnet.

11 Address Example N e t w o r k S u b n e t H o s t Network = Subnet = 55 Host = 12

12 Decimal vs binary notation To simplify human reading of IP addresses, we use decimal notation: The routers view an IP address as binaries:

13 Cheat sheet #1 A set of N bits can store 2 N different values 2 0 = = = = = = = = = 256

14 In class examples Translate to decimal: Translate to binary:

15 IP Classes IP Networks are of various sizes based on whether they are Class A, Class B or Class C. Address Class can be determined by value in 1 st byte of the IP address Class A = First half of all IP addresses. 1 st byte in range [0-127] Class B = Half of remaining addresses. 1 st byte in range [ ] Class C = Half of remaining addresses. 1 st byte in range [ ] In classfull IP addressing, you know what portion of IP address is the network address by just looking at the IP address the first octet will tell you the class. Important note: In today s network, you will almost never see classfull networks, you will need to rely on the subnet mask (more on that later) to know what part of the IP address is the network portion and what part is the host portion.

16 IP Address Classes Address Class A B C Network Prefix Size 1 byte 2 bytes 3 bytes Value in 1 st byte

17 IP Network Sizes Address Class Number of Networks (A) Maximum Hosts per Network (B) Total IP Addresses (A*B) A = ~16 million ~2 billion B 64 * 256 = 16, = ~65,000 ~1 billion C 32 * 256 * 256 = 256 ~1/2 billion ~2 million

18 Network address/host address IP addresses have 2 (or 3 depending how you look at it) parts: Network and subnet number Host number If I have an IP address, how do I know what part is the network or and what part is the By looking at the subnet mask. 2 ways of documenting it: Classic Mask notation: or The 1 designate the network/subnet ID and the 0 the host addresses Canonical notation: /16 means there are 16 1 in the mask. The subnet mask can be either explicit or implied. In classfull addressing it is implied: Class A: first octet is network ID: or /8 Class B: first two octets are network ID: or /16 Class C: first three octets are network ID: or /24 No, in classful it is determined by the few few bits In classless: you need to know the mask In classfull you main network may be subnetted: you then also need to know the mask

19 Network address/host address Examples Question: What is the network number and host number of the following: Classfull: Classless / / / /24

20 Network address/host address Examples more tricky! Classless or classfull with subnets: / More examples??? More In homeworks

21 IP Addresses How does every device on the Internet get a different IP address? IP Network prefixes are assigned to organizations by the Internet Corporation for Assigned Names and Numbers (ICANN) NO! Assigned by ISP, RIR or IANA if you qualify Who?: ISPs, Universities, large businesses These organizations then control all IP addresses starting with that IP Network prefix In the Old times (9+ years ago) Classfull networks were assigned. Today: classless. As an organization, can you get your own IP subnet today?

22 Other Ways to get IP Addresses Small businesses and individuals usually don t go through the ICANN nobody does, ICANN doesn't do that Small businesses are loaned a group of IP addresses by their ISP Home PCs can get a dynamically assigned (DHCP) address from ISP on each connection. SOHO routers can share a single DHCP address from ISP with multiple internal devices by providing a Network Address Translation (NAT) service.

23 Static IP Addresses A Static IP address is permanently assigned to a particular host device and typically must be manually configured into PC or device. Network/Subnet IP address values must be correct for the subnet on which this PC is located. Also, to be able to communicate outside its own network, a default gateway must be set correctly. Important aspect: the default gateway should be set to a value on your own subnet! Other parameters may need to be properly set: DNS, application specific values (phone # for example).

24 IP Address Assignment DHCP (Dynamic Host Configuration Protocol) Server When PC powers up, sends broadcast to DHCP server. DHCP server dynamically allocates an IP address from pool of IP addresses for that subnet. Address has a renewal time associated Server can assign IP address, DNS server address, local router address, and other parameters to PC.

25 DHCP Parameters DHCP server passes the following information to each host : IP Address for the host machine Subnet mask for its subnet Gateway address for its nearest router DNS server address for domain name resolution Anything else that might be useful, such as telephone number and features for IP phone.

26 Address Resolution Protocol (ARP) A broadcast protocol used to determine the MAC address corresponding to a known IP address ARP Request containing IP address is broadcast on a subnet (using the MAC all 1s broadcast destination address). ARP Reply is sent by device that recognizes its IP address in the ARP Request. IP Address/MAC Address pairs are stored in ARP Table by the sender so ARP Request does not need to be re-sent.

27 PC Packet Delivery When a PC has an IP packet to send, it does the following: Check whether destination IP address is on the same subnet or a different subnet as the sender. If destination IP on same subnet: Look up destination IP address in ARP Table, get MAC address for destination If destination on different subnet: Look up default gateway address in ARP table, get MAC address for next router. Forward the IP packet out appropriate Ethernet port with Ethernet destination found by ARP.

28 What do routers do? Store and Forward packets based on destination IP address Interconnect multiple IP subnets Provide a gateway between different physical networks. Provide a boundary for network security and management Firewall services (packet filtering)

29 Routers vs. Switches Both IP routers and Ethernet switches receive data packets, store them in a buffer, and forward them towards their destination, but there are differences: Address: switches look at destination Ethernet MAC address, routers look at destination IP address. Path learning: switches build Forwarding table by looking at source addresses in passing packets, routers build Routing table by exchanging Route Table Update messages with other routers.

30 Routers vs. Switches Path complexity: switches assume there is only one path to each destination; routers assume there are many paths and keep track of a distance metric for each to choose the best one. Security: switches assume that devices mainly trust one another, routers assume not and implement Access Lists which can be used to block any IP source/dest combinations. - not quite right Broadcasts: switches will forward broadcast packets out all ports, router do not typically re-send broadcasts. - they can forward directed broadcasts Scalability: switches can scale up to thousands of devices by storing one Forwarding Table address entry for each device, routers can scale up to thousands of subnets by storing one Route Table entry for each subnet (with hundreds or thousands of devices per subnet = millions of devices addressed).

31 Routers vs. Switches Switch Forwarding Table Dest. Address 1A:2C:33:44:2D:1E 1A:2C:33:48:26:34 1A:2C:33:2D:EE:29 1A:2C:33:46:2C:BB Port Update Time 15:01:0333 pm 15:01:0433 pm 15:01:0363 pm 15:01:2233 pm

32 Routers vs. Switches Router Table (last distance = connected?) Dest. Subnet Port Distance Next Router / 16 S1 2 hops / 24 E1 2 hops / 25 E2 1 hop / 25 E3 1 hops / 0 S

33 IP Router Tables Routers might keep two types of address tables: ARP Table for each port Contains (IP addr, MAC addr) for each host on local subnets Used to look up the matching Ethernet MAC address for a give IP destination address If not found in ARP Table, then MAC values filled in using ARP Broadcast Depending on link technology ARP may not be needed, ARP isn't inherently necessary, but probably is in most networks Route Table Contains (Network/Subnet ID, Router Port, Distance) for other reachable subnets

34 MAC MAC MAC MAC 2222 Chicago ROUTE TABLE Dest. Subnet Port Distance / 24 C 0 hop / 24 D 0 hop / 24 A 1 hop / 24 B 1 hop / 24 B 2 hops / 24 B 2 hops ARP TABLE Host IP MAC C Chicago Router A B D Dallas Router Dallas New York Router New York Miami Router Miami

35 Router Packet Delivery When a router has an IP packet to send, it does the following: Find Route Table entry with the longest match of IP network/subnet prefix entry with packet destination address If destination IP on local subnet (distance = 0): Look up Destination IP address in ARP Table, get MAC address for destination If destination on nonlocal subnet (distance > 0): Look up Next Router address in ARP table, get MAC address for next router. What about interfaces (e.g. serial point-to-point) w/o a MAC address? They don't need ARP. Forward the IP packet out appropriate port with appropriate header for outgoing network.

36 What do routers do? Store and Forward packets based on destination IP address Interconnect multiple IP subnets Provide a gateway between different physical networks. Provide a boundary for network security and management Firewall services (packet filtering)

37 IP Routing Example IP Address IP Address Client Ethernet LAN IP Network Token Ring LAN IP Network Server NFS File Services Software TCP/IP Networking Software NIC Driver SW NIC Card MAC #15 Create OPEN FILE Request in NFS format Add TCP/IP Headers with Server IP Address Add Ethernet Info with Router MAC Address Look up IP Dest. Network in Routing Table Recognize MAC Addr. Remove Ethernet Info Routing Software NIC Driver SW NIC Card MAC #17 IP Router NIC Driver SW NIC Card MAC #22 Translate Server IP Address to Server MAC Address Add Token Ring Info with Server MAC Address Execute OPEN FILE Operation Check TCP/IP Info. Remove TCP/IP Headers Recognize MAC Addr. Remove Token Ring Info NFS File Services Software TCP/IP Networking Software NIC Driver SW NIC Card MAC #23 Ethernet NFS TCP/IP Ethernet Trailer Request HeadersHeader Src: Dest: Src: 15 Dest: 17 Token Ring Trailer NFS Request TCP/IP Headers Src: Dest: Token Ring Header Src: 22 Dest: 23

38 Subnetting IP Networks You can break an IP Network (or subnet) into smaller subnets by choosing some additional bits in the address to be used as Subnet bits. IP addresses of all hosts within a subnet have identical IP network/subnet prefix. Key issue: how many subnets are needed? By using X Subnet bits per address, you get 2 X unique subnets Example: if Subnet field is 6 bits long, then 2 6 = 64 subnets can be addressed by internal routers.

39 Cheat sheet #2 Equivalent values: #routing bits vs subnet mask /16 = /18 = /20 = /22 = /17 = /19 = /21 = /23 =

40 Cheat sheet #2b Equivalent values: #routing bits vs. subnet mask /24 = /26 = /28 = /30 = /25 = /27 = /29 = /31 =

41 Subnet Mask Example A Company is assigned Class B address and decide they want 256 subnets. What subnet mask should they use?

42 Subnet Mask Example Network Subnet Host Subnet Mask: Subnet Mask: Full Subnet: / 24

43 Subnet Mask Example Another example. An ISP owns a Class B address. One of their customers, JoyCo, wants a block of 1000 IP addresses. What subnet mask does the ISP program into their routers so that JoyCo s block of addresses is routed correctly?

44 Subnet Mask Example Subnet Mask: Network bits, 6 Subnet bits, 10 host bits Number of Subnets = 2 6 = 64 Number of Hosts per Subnet = = 1022 Cisco Notation: X.Y.Z.0 / 22 Which leaves almost no room for expansion and further subnetting

45 Another Example ISP X is allocated Class C IP Network / 24 by the IANA. They would get it via an RIR today ISP X splits these 256 addresses as follows: / IP addresses for DSL customer DHCP / IP addresses for SOHO customer DHCP / static IP addresses allocated to JonesCo. Each time they split, they lose two to network and broadcast address JonesCo further splits its 64 addresses into 4 subnets: / static IP addresses for company servers , 224, 240 / 28 3 subnets of 16 each for 3 internal departments Product Design, Marketing and Sales.

46 Router Packet Delivery - again Key operation in Route packet delivery: Determine whether Destination IP address matches with a subnet in Route Table entry. How is this done? For one entry in route table, let DN = Destination subnet, SM = Subnet mask) If DN = [(Dest. IP address) AND (SM)] then this Route Table entry matches Destination address. Note: if there are no exact match, the router will match the IP to the longest possible prefix and forward the packet based on that.

47 Routing Example: Let s write the routing tables in class

48 What do routers do? Store and Forward packets based on destination IP address Interconnect multiple IP subnets Provide a gateway between different physical networks. Provide a boundary for network security and management Firewall services (packet filtering)

49 IP Private Addresses Some IP Address blocks are set aside for private use. Private IP Networks : Class A: /8 Class B: /16 to /16 ( /12) Class C: /24 to /24 ( /16) Cannot be used on the public Internet backbone. Backbone routers do not have any route table entries for these networks. - hehe, sometimes they leak

50 Network Address Translations Network Address Translation allows a single public IP address to be shared by multiple internal hosts who use private IP addresses internally. - NO! That requires port address translation too - NAT technically maps between one external address and one internal address The access router or firewall swaps IP addresses in the headers of incoming and outgoing IP packets.

51 SOHO NAT router Subnet / 24 Subnet / 24 Client PC Client PC Client PC Server Client PC Client PC Client PC Server Ethernet Hub/Switch Ethernet Hub/Switch NAT Router External Address Modem / CSU CATV or DSL or T-1 Line

52 NAT Table in Router ports here refer to source port Internal IP & Port External IP & Port

53 Network (port) Address Translation For each outgoing packet: NAT router will look up Source IP, port in Internal part of NAT table If found, swap in the External IP, port, send out to Internet. If not found, choose a new, unused port number and create a new NAT table entry with Internal IP, port = packet Source IP, port External IP, port = Fixed external IP (i.e ), new port #. For each incoming packet: NAT router will look up Dest IP, port in External part of NAT table: If found, swap in the Internal IP, port, send into local subnets. If not found, log error (packet in w/o previous pkt out??) and send back Packet Undeliverable error message using ICMP (or not: depends on NAT/firewall).

54 Some more IP subnetting examples and exercises First: subnetting is easy. We can even make it easier.

55 Cheat sheet #3 Subnet, host bits per byte based on subnet mask value Mask Value (Decimal) Mask Value (8-bit Binary) Subnet Bits Host bits

56 Cheat sheet #3 Subnet, host bits per byte based on subnet mask value Mask Value (Decimal) Mask Value (8-bit Binary) Subnet Bits Host bits

57 Cheat sheet #4 Value splits per byte based on mask value other than 0 or 255. Mask Value #Subnets #Values per subnet Ranges , , , , , 32-63, , , 16-31, ,

58 Cheat sheet #4 Value splits per byte based on mask value other than 0 or 255. Mask Value #Subnets #Values per subnet Ranges , 8-15, , , 4-7, 8-11,, , , 2-3, 4-5,, ,

59 Sample Problem Consider a PC with IP and subnet mask What IP network is this address on? What is the subnet ID for its subnet? List all IP addresses on same subnet as this one. What is maximum number of hosts in this subnet? How many different subnets exist in this IP network using this subnet mask?

60 Solution Consider a PC with IP and subnet mask What classfull IP network is this address on? Class C IP network / 24. Classful (A, B, C) addressing is obsolete, almost always don't say that anymore What is the subnet ID for its subnet? Cheat sheet #3 3 more subnet bits gives /27. Cheat sheet #4 falls into IP range , so Subnet ID = / 27. List all IP addresses on same subnet as this one. Cheat sheet #4 falls into IP range , so range of addresses is to What is maximum number of hosts in this subnet? IP range has 32 addresses per subnet. But we subtract two because we can t assign (subnet ID) or (broadcast address) to any host machine. Maximum number of hosts = 30. How many different subnets exist in this IP network using this subnet mask? Cheat sheet #4 8 subnets exist within this Class C IP network using this subnet mask.

61 Sample Problem Consider a PC with IP and subnet mask What IP network is this address on? What is the subnet ID for its subnet? List all IP addresses on same subnet as this one. What is maximum number of hosts in this subnet? How many different subnets exist in this IP network using this subnet mask?

62 Solution Consider a PC with IP and subnet mask What IP network is this address on? Class B IP network / 16. Classful (A, B, C) addressing is obsolete, almost always don't say that anymore What is the subnet ID for its subnet? Cheat sheet #3 4 more subnet bits gives /20. Cheat sheet #4 falls into IP range , so Subnet ID = / 20. List all IP addresses on same subnet as this one. Cheat sheet #4 3 rd byte has IP range , 4 th byte has range 0 255, so range of addresses is to What is maximum number of hosts in this subnet? IP range has 16 addresses per subnet in 3 rd byte. But there are also 256 possible addresses in 4 th byte. Total hosts = 16*256 = But we subtract two because we can t assign (subnet ID) or (broadcast address) to any host machine. Maximum number of hosts = How many different subnets exist in this IP network using this subnet mask? Cheat sheet #4 16 subnets exist within this Class B IP network using this subnet mask.

63 Sample Problem Consider a PC with IP and subnet mask This PC wishes to transmit a data packet to destination IP Does this packet need to go through a router or not?

64 Solution Consider a PC with IP and subnet mask This PC wishes to transmit a data packet to destination IP Does this packet need to go through a router or not? What is the subnet ID for source IP address? Source IP address is on class A network /8 Classful (A, B, C) addressing is obsolete, almost always don't say that anymore get the point yet? Cheat sheet #3 2 more subnet bits gives /10. Cheat sheet #4 source address 2 nd byte falls into IP range 0-63, so Subnet ID = / 10. What is the subnet ID for destination IP address? Dest. IP address is on class A network /8 Cheat sheet #3 2 more subnet bits gives /10. Cheat sheet #4 source address 2 nd byte falls into IP range , so Subnet ID = / 10. These addresses are on different subnets. So - YES the packet must be sent through a router to be delivered.

65 A routing table problem See

66 Domain Name System A system of Domain Name System (DNS) (someone went to the redundancy school of redundancy :-) servers allows users to refer to any device by DNS Name (i.e. dlweb.cs.depaul.edu) rather than by IP address (i.e ) dlweb.cs.depaul.edu Host subdomain domain top-level domain

67 Domain Name System This slide is pretty bad don't use this Top-Level Root DNS Servers store address of each Domain Server for a particular toplevel domain (i.e..edu ) Domain DNS Servers store names and IP addresses for organization (i.e. depaul.edu) name servers Domain Names are registered with the ICANN and associated with IP address prefixes. Example (depaul.edu <=> x.x)

68 DNS Top-Level Domains Top-Level Domains (TLDs): The original 7 generic TLDs.edu,.com,.gov,.mil,.org,.net,.int. The.arpa TLD for special lookups New TLDs approved in 2002/3:.info,.biz,.aero,.coop,.museum,.name,.pro 2-letter top-level domains for each country -.fr for France,.de for Germany, etc. See

69 Domain Name System Example: You type Your PC sends DNS request to DePaul DNS server DePaul DNS server sends request to.com top-level DNS server asking it to look up server address. Top-level DNS server sends back address referral for ibm.com Domain DNS Server at IBM Corp. DePaul DNS server sends request packet to IBM DNS Server asking it to look up IBM DNS server looks up IP address and sends result back to DePaul DNS Server. DePaul DNS server sends IP address back to your PC.

70 Domain Name System Caching All DNS servers keep Address Caches where they store all results that they have discovered lately. - not all servers, authoritative-only servers don't keep caches Thus, after DePaul DNS server has looked up once, it stores address and responds locally when additional DePaul users ask about the same name. Cached address information is called non-authoritative and eventually times out.

71 Dynamic DNS Traditional DNS databases are updated manually by a systems admin each time a new name is add or changed in a zone. This is time-consuming and error-prone The Dynamic DNS protocol is designed to automate DNS zone database updates via a set of update messages exchanged between authenticated servers and clients.

72 Useful TCP/IP Utility Programs ARP Can be used to display or modify ARP table at a host. Example: arp a on Windows displays the ARP table PING Used to verify that a host is reachable and provide round-trip packet transfer time not so useful today, often filtered/disabled Example: ping - exhibit A, ping won't work for this host

73 Useful TCP/IP Utility Programs Netstat Information about TCP/IP information stored on a host. Example: netstat provides listing of TCP connections currently in use, netstat r displays the routing table Nbtstat NetBIOS information (station names and addrs) Example: nbtstat -s shows NetBIOS sessions

74 Useful TCP/IP Utility Programs Nslookup - dig tool on unix is better Allows you to send a query to the local DNS server Example: nslookup finds IP address for Available only post-winnt (i.e. WinXP, Win2000, Win2003 not on Win95 or Win98). Tracert - traceroute on unix Shows identity of each router on path to destination Example: tracert

75 Useful TCP/IP Utility Programs Ipconfig, winipcfg Shows IP address and configuration information (winipcfg on Win98 and before) ifconfig TCP/IP configuration utility on Linux/UNIX machines Example: ifconfig -a shows status of all network interfaces.

76 Useful Utility Programs net The net command can be used to view and set network parameters for Windows file sharing. Type net /? at command prompt for list of net options. Examples: net accounts account information net config workstation configuration info net statistics workstation packet stats

77 Useful Utility Programs netsh The netsh commands are a newer set of commands that can be used to view and set network parameters on Windows XP machines. Type netsh /? for list of netsh options. Examples: netsh firewall show config XP firewall settings netsh interface show interface network interface information netsh routing ip nat show NAT configuration

Applied Networks & Security

Applied Networks & Security Applied Networks & Security TCP/IP Networks with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1 Critical

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security Introduction with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1 Critical

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Fundamentals of Computer Networking AE6382

Fundamentals of Computer Networking AE6382 Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet

More information

Microsoft Exam

Microsoft Exam Volume: 176 Questions Question No: 1 One advantage of dynamic routing is that it: A. Automatically maintains routing tables. B. Limits traffic derived from routing protocols. C. Reduces broadcast traffic.

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Internet Protocol Addressing and Routing. Redes TCP/IP

Internet Protocol Addressing and Routing. Redes TCP/IP Internet Protocol Addressing and Routing Redes TCP/IP Internet Topology Internet - WAN Gateway or router Physical Network (LAN) internet LAN LAN LAN Dotted Decimal Notation 2 7 2 6 2 5 2 4 2 3 2 2 2 1

More information

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols SC/CSE 3213 Winter 2013 L9: Control Protocols Sebastian Magierowski York University 1 Outline ICMP ARP DHCP NAT (not a control protocol) 2 1 Control Protocols IP is used to transfer data Network layer

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer Guidelines for Addressing and Naming Use a structured model for addressing

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab 1.1.6 PC Network TCP/IP Configuration Objective Background Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection,

More information

IP Training Programme. Module 1: IP Generic Session 3: IP Services

IP Training Programme. Module 1: IP Generic Session 3: IP Services IP Training Programme Module 1: IP Generic Session 3: IP Services Subjects Review The IP Address continued Routing protocols (Concept) Firewalll and NAT DNS server and DNS operation concept DHCP server

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

NT1210. Final Exam Review 8 to 10

NT1210. Final Exam Review 8 to 10 NT1210 Final Exam Review 8 to 10 Introducing the Internet Protocol (IP) TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the

More information

CS118 Discussion, Week 6. Taqi

CS118 Discussion, Week 6. Taqi CS118 Discussion, Week 6 Taqi 1 Outline Network Layer IP NAT DHCP Project 2 spec 2 Network layer: overview Basic functions for network layer Routing Forwarding Connection v.s. connection-less delivery

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking. Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Chapter 5 Advanced Configuration

Chapter 5 Advanced Configuration Chapter 5 Advanced Configuration This chapter describes how to configure the advanced features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. Configuring Advanced Security The modem router

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 7 - Sections & Objectives 7.1 IPv4 Network Addresses Convert between binary and decimal numbering

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Chapter 6. The Protocol TCP/IP. Introduction to Protocols Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Session 16 Windows 7 Professional DNS & Active Directory

Session 16 Windows 7 Professional DNS & Active Directory Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating

More information

Agenda. Forwarding (after a little more addressing) Follow-up from last time. Dealing with Address Scarcity. Sharing a Block of Addresses

Agenda. Forwarding (after a little more addressing) Follow-up from last time. Dealing with Address Scarcity. Sharing a Block of Addresses Agenda Forwarding (after a little more addressing) EE22 Fall 20 Scott Shenker http://inst.eecs.berkeley.edu/~ee22/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Section 6.2, IP Routing. Section 6.4, IP/VPN Policy. Section 6.5, IP Quality of Service. Section 6.6, The BANDIT as Firewall

Section 6.2, IP Routing. Section 6.4, IP/VPN Policy. Section 6.5, IP Quality of Service. Section 6.6, The BANDIT as Firewall Chapter 6 IP Routing and IPX Routing This chapter discusses IP routing, IP/VPN Policy, and related features in the BANDIT products. It also discusses IPX routing. See the following sections: Section 6.2,

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

Networking Theory CSCI 201 Principles of Software Development

Networking Theory CSCI 201 Principles of Software Development Networking Theory CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Networking Overview IP Addressing DNS Ports NAT Subnets DHCP Test Yourself Outline USC CSCI 201L

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

UIP1869V User Interface Guide

UIP1869V User Interface Guide UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

RSC Part II: Network Layer 3. IP addressing (2nd part)

RSC Part II: Network Layer 3. IP addressing (2nd part) RSC Part II: Network Layer 3. IP addressing (2nd part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking:

More information

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP

More information

Basic Internetworking (IP)

Basic Internetworking (IP) Basic Internetworking (IP) CSCI 466: Networks Keith Vertanen Fall 2011 Internetworking Service model Internet protocol (IP) History Packet format Fragmenta?on Global addressing Overview Discovering link-

More information

The OSI model of network communications

The OSI model of network communications The OSI model of network communications The TCP/IP networking layers are mapped to the OSI model The Next Generation TCP/IP stack IPv6 is supported natively in Windows Vista, Windows 7, Windows Server

More information

Internet Network Protocols IPv4/ IPv6

Internet Network Protocols IPv4/ IPv6 Internet Network Protocols IPv4/ IPv6 Prof. Anja Feldmann, Ph.D. anja@inet.tu-berlin.de TCP/IP Illustrated, Volume 1, W. Richard Stevens http://www.kohala.com/start 1 IP Interfaces IP address: identifier

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014

CPEG514 Advanced Computer Networks. Atef Abu Salim University of Nizwa Spring 2013/2014 CPEG514 Advanced Computer Networks Atef Abu Salim University of Nizwa Spring 2013/2014 Today s Class Topics Course Syllabus Computer Networks LANs and WANs The Internet Protocols, Layers and Interfaces

More information

Chapter 06 IP Address

Chapter 06 IP Address Chapter 06 IP Address IP Address Internet address Identifier used at IP layer 32 bit binary address The address space of IPv4 is 2 32 or 4,294,967,296 Consists of netid and hosted IP Address Structure

More information

Lecture 8 Network Layer: Logical addressing

Lecture 8 Network Layer: Logical addressing Data Communications ACOE412 Lecture 8 Network Layer: Logical addressing Spring 2009 1 0. Overview In this lecture we will cover the following topics: 14.Network Layer: Logical addressing 14.1 IPv4 Addresses

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information